Premium Essay

Information Tecnology

In: Computers and Technology

Submitted By dregulus333
Words 407
Pages 2
Lab#1 Questions

DeAundre Graves
4/9/2014

Name at least five applications and tools pre-loaded on the Windows 2003 Server Target VM (VM
Name: “WindowsTarget01”) and identify whether that application starts as a service on the system or must be run manually?
A.FileZila Server | Y |
Nmap | N |
WireShark | N |
WinPcap | N |
Tenable Network Security | N |
Tftpd32-SE | N |.

2. What was the DHCP allocated source IP host address for the Student VM, DHCP Server, and IP? default gateway router?
A. a. Student – 10.96.108.20 b. TargetWindows01 – 10.96.109.30 c. TargetUbunto01 – 10.96.109.36 d. TargetUbuntu02 – 10.96.109.40

3. Did the targeted IP hosts respond to the ICMP echo-request packet with an ICMP echo-reply packet when you initiated the “ping” command at your DOS prompt? If yes, how many ICMP echo-request packets were sent back to the IP source? A. Yes, 4

4. If you ping the “WindowsTarget01” VM server and the “UbuntuTarget01” VM server, which fields in the ICMP echo-request / echo-replies vary? A. The TTL on Windows was 128 while on Ubuntu the TTL was 64
5. What is the command line syntax for running an “Intense Scan” with ZenMap on a target subnet of
172.30.0.0/24?
A. Nmap –T4 –A –V –PE –PS22, 25, 80 –PA21, 23, 80, 3389 10.96.109.30

6. Name at least 5 different scans that may be performed from the ZenMap GUI and document under what circumstances you would choose to run those particular scans.
A. Ping Scan Quick Scan Intense Scan Regular Scan Intense Scan, No Ping

7. How many different tests (i.e., scripts) did your “Intense Scan” definition perform? List them all after reviewing the scan report.
A.36
1.Nbstat
2. Smb-os-discovery
3. Smbv2-enabled

8. Describe what each of these tests or scripts performs within the ZenMap GUI (Nmap) scan report.
A. 1.…...

Similar Documents

Premium Essay

Information

...describe the advantage of using the relational model. (6). Create an E-R diagram using graphical depicting software that could theoretically be used in a restaurant application. Now that you know the purpose of this assignment, I will define three key terms that will be discussed in this assignment. The first term is Database (DB), which is a collection of information organized in such a way that a computer program can quickly select desired pieces of data. You can think of a database as an electronic filing system. Traditional databases are organized by fields, records, and files. To access information from a database, you need a database management system (DBMS). This is a collection of programs that enables you to enter, organize, and select data in a database. The second term, Entity-Relationship Model (ER) is a way of graphically representing the logical relationships of entities or objects in order to create a database. The ER model was first proposed by Peter Pin-Shan Chen of Massachusetts Institute of Technology (MIT) in the 1970s (Ricardo, 2012, p. 19). The third term is relational model, which views information in a database as a collection of distinctly named tables. Each table has a specified set of named columns, each column name or attribute being distinct within a particular table, but not necessarily between tables. Next, I will address the advantages of a relational model specific to ACME Global Consulting. Since Acme Global Consulting is a leader in......

Words: 1493 - Pages: 6

Free Essay

Tecnology

...psychiatric problems to developmental disorders and other crime related issues. The youths with personality disorders such as decreased self-esteem are at a high state of joining a gang, a place where he will fell more appreciation. The media in their state of reporting these issues shows different expressions and variation of their side of their story. Some put the blame on the parents and the upbringing trends, others on the children exposure to technological advances, others still on the state for their failure to adopt policies to protect the teenagers. Assessment of different technological issues in the media proves that there is frequent reporting of new information that has never been known previously. The information is useful in creating awareness to the publics of the occurrences. Analysis of several website information on teen violence Racine and Henry in their article do intensive explorations on the teen dating violence, and various household perception on the issue. They also try to evaluate the differences and relationship between such violence and the home life of the African American teens. They do a detailed analysis of some of the researches conducted by different institutions, making correlations with the date findings. Their findings are very comprehensive on the issue of teen violence. Their report concentrates mainly in the core areas of dating violence, its etiology, prevalence, media influence and the role of clinical therapy in alleviating the......

Words: 1575 - Pages: 7

Premium Essay

Information

...There are Information Systems and Applications use by different parts of an organization. The ones that will be discussed in this essay are: Accounting, Finance, and Human Resource Department. The different systems that interchange within the organization’s departments are: Management Information System, Enterprise Resource Planning System, and the Expert System. Each of these systems help management had access to important information that help make changes on the organization’s productivities and uses the information to make changes within the organization and all business decisions. For example, the production plans and production results are inputs to the budgeting and accounting system (for financial planning) and the human resources systems (for staffing, training, etc.). The systems use a blend of computer and communications, hardware and software, human-machine interaction, and internal and external sources of data. A management information system (MIS) is a system or process that provides the information necessary to manage an organization effectively. MIS is viewed and used at many levels by management. It should be supportive of an organization’s longer term strategic goals and objectives. It is also those everyday financial accounting systems that are used to ensure basic control is maintained over financial recordkeeping activities. Financial accounting systems are an important functional element or part of the total MIS structure. An Enterprise Resource......

Words: 447 - Pages: 2

Premium Essay

Role of Information Tecnology on Banglalink

...The role of Information Technology on Banglalink Submitted by Mahmud Hasan Ghani ID NO: 09535046 Program: EMBA Batch: 52 Group: F [pic] Submitted to Md. Shahadat Hossain Lecturer, School of Business, University of Information Technology & Science Letter of Submission 13th August, 2010 Md. Shahadat Hossain Lecturer, School Of Business, University of Information Technology & Science. Sub: Submission of term paper Dear Sir, It is my great pleasure to submit my term paper on the topic “The role of Information Technology on BANGLALINK “ as a part of my course code MBA-501 under the MBA program. I have prepared this term paper, as a fulfillment of the course requirement of my EMBA program. To make the term paper up to the standard, I have tried my level best to fulfill the requirements. I hope that this will help me in my future practical life. I believe that you will accept my work and it would be great pleasure that if you review my work cordially. I also believe that this report will be able to fulfill your expectation. Sincerely Yours, Mahmud Hasan Ghani ID NO: 09535046 Batch: 52 Group: F Contents Letter of Submission …………………………………………………………………………1 Table of Contents …………………………………………………………………………….2 Acknowledgement ……………………………………………………………………………3 Abstract ……………………………………………………………………………………….4 1. Introduction.………………………………………………………………………………5-7 ...

Words: 5107 - Pages: 21

Premium Essay

Information Tecnology Milstones

...University of Phoenix Material Information Technology Milestones Worksheet Complete the chart below. Include a minimum of 10 information technology milestones or events that impacted human services. |Year |Milestone or Event |Impact on Human Services | |1996 |Amber Alerts |Provides an online integrated national database for missing children | | | |Initiates a widespread alert when a child goes missing | |1965-1970 |Decision Support System |This system integrates organizational skills and human services to provide better | | | |service to clients. | | | |By integrating organization in human services, it has become easy to diagnose | | | |problems and find faster solutions to the client’s issues. | |1972 |Electronic medical filing |By filing the client’s records online it is easier to access them and they have less| | |system |errors. | | | |Nurses......

Words: 355 - Pages: 2

Free Essay

Tecnology

...With the New Technology coming out today the world is headed in a new direction. The mobile phone has made it made it easier for people to make and receive calls over a radio link while moving around a wide geographic area. It connects to the cellular network that is provide though a mobile operator allowing access to the public telephone network. The new modern telephone supports a side variety of other services such as text messaging MMS, email, internet access, short range wireless communications infrared, Bluetooth, and various other applications. Two engineers with Intel’s Software and Solutions Group describe the benefits of the UEFI pre boo software t mobile and embedded devices. The Unified Extensible Firmware Interface specifications are meant to facilitate emerging technologies, services, security mechanisms, and user experiences that come into play prior to loading the device’s OS. It was designed to allow for cross functionality between devices, software, and systems, unified Extensible Firmware Interface specifications encourage innovation, and helping to drive the evolution of the next generation technologies, such as the expansion of embedded and non pc systems. The UEFI provides a plurality of services, including console, storage, and networking services. Hosted and implemented by the UEFI Forum, this technology enables firmware innovation by promoting a standardized, extensible, and interoperable firmware interface that extends far......

Words: 602 - Pages: 3

Free Essay

Information

...Information Assurance and Security Nick Rosasco Karthikreddy Nalapatla 3884252 What is a Port Number A port number is a way to identify a specific process to which an internet or other network message is to be forwarded when it arrives at a server. For the transmission control protocol and the user Datagram protocol, a port number is a 16 bit integer that is put the header appended to a message unit. This port number is passed logically between the client and the server transport layers and physically between the transport layer and the Internet Protocol layer and it will forward it on to the other layers. For an example, a request from a client to a server on the internet may request a file to transfer from the host File Transport Protocol (FTP) server. In order to pass that request which is passed by us to the FTP in the remote server, the Transmission Control Protocol (TCP) identifies the port number which is of 16 bit length, then that port will forward the request to the FTP Server. FTP and the FTP Port Number The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files from one host to the other host over a TCP – based network, for an example Internet. FTP is a Client – server architecture and uses a separate control and the data connections between the client and the server. The model of the FTP is shown below. Fig 1: File Transport Protocol Model Executing......

Words: 1400 - Pages: 6

Premium Essay

It Tecnology

...performed immediately. At system level, user behavior is also useful for intrusion detection. An intrusion can be identified before it happens based on some specific behavioral patterns indicating of suspicious identities or actions. Theoretical Perspectives As mentioned earlier, computer system is built for user but not vice versa. Thus, the computer system should behave as user expected and required. In order to understand the user, his or her behavior on using the system must be known. The following were some of the common user behaviors: (12) User doesn't like to wait. User prefers some entertained graphical elements like animation. User doesn't like to repeat the same tasks. User hates repetitive confirmation and information. However, different user may have different behaviors and preferences. Therefore, the system needs to identify the user behavior and keep track on it from time to time because the user behavior may be changed along the way. In this case, observation on user behavior which typically based on log files is needed and appropriate adaptations based on the observation will be performed either implicitly or explicitly. If implicit approach is taken, meaning that the system will change automatically based on the observed behavior without user acknowledgement while for explicit one, the system will seek confirmation from user before making any adaptation. The system described here is user behavior-based system which aims at anticipating......

Words: 493 - Pages: 2

Premium Essay

Advanceing Tecnology Advantage and Disadvantage

...the job of man and the labor force has been considerably reduced since a machine can do the job of several people at a time. This has given man more leisure time and has freed him of working continuously for several hours. Man now has more time for his family and for relaxing himself. Mechanization, which has been due to technology, has improved man's life by giving him more time to recognize himself in this modern world. Technology has always influenced people's lives. Mass media, which are the offspring of technology, have greatly affected people's lives and will always have an influence on man. Mass media comprise the television (TV), radio, cinema, satellite transmission among others. The TV, as we all know, is a major source of information as well as entertainment. It plays a very important role in our lives by bringing the world news into our homes and by making us participate in almost every world event. We cannot deny the fact that the radio is an important tool for man and cinema is the most common means of a family outing or a date. Another technology which is under constant debate is that of genetic engineering and its application to food. This technology * 1 * 2 * Next Page >> Below are the top articles rated and ranked by Helium members on: The pros and cons of advancing technology * 1 of 10 by Oorvashi Panchoo Technology has always flourished for the gain of mankind. The major achievements of technology have left man spell-bound ......

Words: 604 - Pages: 3

Premium Essay

Information Tecnology

...INFORMATION TEACHNOLOGY PROJECT. TERMS ASSOCIATED WITH THE INTERNET. A. E-MAIL: Also known as Electronic Mail, an E-mail is a system for sending messages from one individual to another via telecommunication links between computers or terminals using dedicated software. ADVANTAGE- Emails are fast. They are delivered at once around the world. No other form of written communication is as fast as an email. DISADVANTAGE- Emails may carry viruses. These are small programs that harm your computer system. They can read out your email address book and send themselves to a number of people around the world. B. NEWSGROUP: A newsgroup is a discussion about a particular subject consisting of notes written to a central Internet site and redistributed through Usenet, a worldwide network of news discussion groups. ADVANTAGE- It is also easier to find a newsgroup, and they sometimes have a moderator, who is someone who makes sure that things stay on track and do not disintegrate into something that is socially unpleasant. DISADVANTAGE- A newsgroup is not as quick as an email or even a mailing list. Very often there will be a delay of at least a day, often longer, before a response is given. C. IRC: Internet Relay Chat (IRC) is an application layer protocol that facilitates the transfer of messages in the form of text. The chat process works......

Words: 2374 - Pages: 10

Premium Essay

Information

...Western Governors University Create a written proposal for a new information management system Project: Electronic Medical Record System Upgrade Prepared for: Western Governors University Hospital Prepared by: Emilie Reid, RN Western Governors University Hospital is in need of implementing an electronic medical record (eMAR) system. Currently they are using a paper documentation system. The two systems currently being considered are Meditech and Epic. This proposal will compare both systems to explore which will be selected and the most practical for Western Governors University Hospital to adopt. The current hospital record management system is paper based requiring several paper forms containing various information from different interdisciplinary teams incorporated from a patients history of hospital stays. Often, forms are not updated to reflect current patient information, lost between departments or vital information is not correctly incorporated. It is also common practice that multiple copies of the same information exist within the hospital setting posing a risk for inconsistencies of data sources. Within a hospital setting it is imperative that procurement, management and recovery of large volumes of information be easily accessible to anyone with direct medical contact with a patient. Such information would include; patient medical and personal information, health history, staff information, medications, allergies, labs and testing results as......

Words: 2004 - Pages: 9

Premium Essay

Advance Information Tecnology

... Advanced Information Management and Application of Technology Maydene A Huie Western Governors University Proposal for a New Information Management System to Implement Meaningful Use Interdisciplinary Committee Team Members Implementing a new information management system for a 100 bed hospital to bring them into compliance with Meaningful Use Legislation, requires the expertise of different disciplines within the hospital. For this hospital the team will consist of myself, a Clinical Nurse Specialist with a Post-Masters Nursing Informatics Certificate, Health Information Management (HIM) Specialist, in charge of medical records, and ensuring regulatory compliance, Information Technology (IT) Specialist who is knowledgeable in computer software and hardware, Physician who is a the Medical director with extensive experience with electronic medical charting, Pharmacy Director who is a pharmacist with EMR and PYSIX experience and , Chief Financial Officer to manage the budget, and the Director of staff development who is a Mastered prepared RN with EMR experience and is in charge of staff education. The HIM Specialist is chosen because of his experience with health information management, regulatory compliance and HIPAA. This knowledge is vital for implementing this system to ensure that the EMR chosen will meet the criteria for the stages of Meaningful Use. The IT Specialist is chosen for his knowledge of computer hardware and software and will be......

Words: 2381 - Pages: 10

Premium Essay

Focus on Tecnologies

...The Brief Explaining Focus on Tecnologies and e-Marketing 1. A brief report describing the usefulness of this Web site for businesses desiring to sell to the government market. In a modern era marketing communications has been developed with the help of cutting edge technologies such as softwares, internet web sites and blogs. Some of these are used by businesess which are working to consumers, such as online shoppings and e-services, but there is also governmental web sites which are helping business owners and shareholders to make a contact and establish new business opportunites by selling or buying from each another. In U.S.A case we have been searched governmental Federal Business Opportunities web site and have conducted a research about B2B marketing. We have learnt that focusing on technologies is an essential way to help the busineses meet in an official web sites and creat more broder business opprtunites, as it makes easier for busineses to find right busineses in right place in a right time and with the right cost with the help of advanced searh options which are presented by thuse web sites. 2. Write a brief report explaining how small businesses can use these resources. We have also learned that new established businesses which are usally small, can use the options which are given by governmental federal websites, these options help them to create new business contracts and to establish new busineses between states, and promote their busineses to......

Words: 264 - Pages: 2

Free Essay

Tecnology and Bussiness

...the compound, it would allow the staff to type all logs on the database and save them to a particular file accessed by whoever requires it. Per policy and procedure, logs are required to be saved for a minimum of 5 years’ time, therefor if all logs were saved to the database now they can be backed up on a small compact disc for 5 years. Communication is the key to success, there are always interdepartmental memos put out and posted on paper throughout the compound for staff review and acknowledgement. If the department gave all their employees login, access to the computer and email capabilities this would allow staff to receive vital information the needs to be addressed and eliminates paper usage etc. This system can also improve staff briefing during relief. Each shift can make notes on the computer ensuring proper and detailed information pertaining to the operation of the institution on that day. Another way the department of corrections can utilize technology in their business and save money is by implementing a system for the inmates to utilize their Identification card to scan and receive there tray for meals. Currently the department utilizes staff to monitor the distribution of meals to the inmates, but sometimes there is only one staff member in the chow hall during feeding and hundreds of inmates eating, making it complicated to ensure one tray per inmate, therefore costing the department more money. “In Fiscal Year 2009-10, it cost $19,469 a year or......

Words: 1137 - Pages: 5

Premium Essay

Information

...seemingly eternal longevity, the Chanel brand is unequaled.  In good times and bad, this brand remains strong as a symbol of a life lived in all the right places, doing all the right things. [pic] 5th Dimension – RUGGEDNESS Interestingly, consumers pick up on this personality dimension quite well.  Rugged brands are seen as outdoorsy and tough.  The North Face has built an empire by outfitting people who actually do scary outdoorsy things, and those who just like to look good on the streets of NYC. [pic] The sources from where I, collected the information for the assignment- • From course materials, provided by our teacher • Strategic Brand Management by Kevin Lane Keller • Principles of Marketing by Philip Kotler The online source from where I collected information- • www.learnmarketing.net • www.google.com ( as search engine), • www.yahoo.com ( as search engine) [pic]...

Words: 852 - Pages: 4